First published: Wed Sep 01 2021(Updated: )
Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier) and 2.3.7 (and earlier) are affected by an improper input validation vulnerability during the checkout process. An unauthenticated attacker can leverage this vulnerability to alter the price of items.
Credit: psirt@adobe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Adobe Adobe Commerce | >=2.3.0<=2.3.7 | |
Adobe Adobe Commerce | >=2.4.0<=2.4.2 | |
Adobe Adobe Commerce | =2.4.2-p1 | |
Adobe Magento Open Source | >=2.3.0<=2.3.7 | |
Adobe Magento Open Source | >=2.4.0<=2.4.2 | |
Adobe Magento Open Source | =2.4.2-p1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-36030.
The severity of CVE-2021-36030 is high, with a severity value of 7.5.
Magento Commerce versions 2.4.2 (and earlier), 2.4.2-p1 (and earlier), and 2.3.7 (and earlier) are affected.
An unauthenticated attacker can leverage this vulnerability to alter the price of items during the checkout process.
Yes, Adobe has provided a fix for CVE-2021-36030. Please refer to the reference link for more information.